A vulnerability, which was classified as problematic, was found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=save_user. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273351.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://vuldb.com/?id.273351 | third party advisory vdb entry |
https://vuldb.com/?ctiid.273351 | signature third party advisory permissions required |
https://vuldb.com/?submit.383515 | third party advisory |
https://gist.github.com/topsky979/03ae83fd32a94c85f910c8e3a85fa056 | exploit |